Sciweavers

3089 search results - page 500 / 618
» services 2008
Sort
View
160
Voted
TRIDENTCOM
2008
IEEE
15 years 9 months ago
The NTP experimental platform for heterogeneous wireless sensor networks
— This paper presents the NTP experimental platform for heterogeneous wireless sensor networks (WSN), which is built on the campus of National Tsing Hua University under the supp...
Sheng-Po Kuo, Chun-Yu Lin, Yueh-Feng Lee, Hua-Wei ...
141
Voted
WIMOB
2008
IEEE
15 years 9 months ago
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks
—To avoid the single point of failure for the certificate authority (CA) in MANET, a decentralized solution is proposed where nodes are grouped into different clusters. Each clu...
Abderrezak Rachedi, Abderrahim Benslimane, Hadi Ot...
130
Voted
ACSAC
2007
IEEE
15 years 9 months ago
Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting
Special purpose trusted computing devices are currently being deployed to offer many services for which the general purpose computing paradigm is unsuitable. The nature of the ser...
Aggelos Kiayias, Laurent Michel, Alexander Russell...
116
Voted
WWW
2010
ACM
15 years 8 months ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
USS
2008
15 years 5 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian